Search Results - (( java implementation cell algorithm ) OR ( knowledge contribution patterns algorithm ))
Search alternatives:
- contribution patterns »
- java implementation »
- implementation cell »
- cell algorithm »
-
1
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
2
An algorithm for Elliott Waves pattern detection
Published 2018“…Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
3
KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights
Published 2024“…Using clustering algorithms such as KMeans, KMeans with Principal Component Analysis (PCA), single linkage, complete linkage, DBScan, and DBScan in conjunction with PCA, we identify distinct customer segments based on loyalty patterns. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Machine Learning Applications in Offense Type and Incidence Prediction
Published 2024“…By applying this algorithm, the study achieves a high level of precision in predicting various types of detrimental behavior, enabling a better understanding of their underlying patterns. …”
Get full text
Get full text
Get full text
Article -
5
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
6
Determination of tree height based on tree crown using algorithm derived from UAV imagery / Suzanah Abdullah ... [et al.]
Published 2021Get full text
Get full text
Conference or Workshop Item -
7
A spatial decision support system framework for optimization of cropping pattern and water resources allocation at pasargard plains, fars province, Iran
Published 2014“…A unit response matrix groundwater model was coupled with a modified version of Genetic Algorithm (GA) in order to optimize cropping patterns and water allocation decisions. …”
Get full text
Get full text
Thesis -
8
-
9
Smart waste management system with IoT monitoring
Published 2023Get full text
Get full text
Get full text
Article -
10
Transitioning from information sharing to knowledge services: unpacking the evolution of rural media within the context of media integration
Published 2023“…The adaptability of TikTok’s content curation algorithms caters to diverse age groups, contributing significantly to user satisfaction. …”
Get full text
Get full text
Get full text
Article -
11
Fish Motion Trajectories Detection Algorithm Based on Spiking Neural Network (S/O: 12893)
Published 2017“…STDP algorithm) has learning capability in memory recall. …”
Get full text
Get full text
Monograph -
12
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…There are many complex factors that contribute to the incidence of dengue, for example, climatic condition, environmental factors, socioeconomic status, socio-demographic variables, human behaviour, and health belief pattern among others. …”
Get full text
Get full text
Thesis -
13
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Ranking-based pruning and weighted support model for gene association in frequent itemsets / Sofianita Mutalib
Published 2019“…Biological domain is one of the critical areas that always seek for useful knowledge and patterns observed through available methods, including data mining. …”
Get full text
Get full text
Thesis -
15
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article -
16
Classification of stock market index based on predictive fuzzy decision tree
Published 2005“…In particular, predictive FDT algorithm is based on the concept of degree of importance of attribute contributing to the classification. …”
Get full text
Get full text
Thesis -
17
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
18
Determining malaria risk factors in Abuja, Nigeria using various statistical approaches
Published 2018“…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
Get full text
Get full text
Thesis -
19
A comparative study between rough and decision tree classifiers
Published 2008“…Theoretically, a good set of knowledge should provide good accuracy when dealing with new cases.Besides accuracy, a good rule set must also has a minimum number of rules and each rule should be short as possible.It is often that a rule set contains smaller quantity of rules but they usually have more conditions.An ideal model should be able to produces fewer, shorter rule and classify new data with good accuracy.Consequently, the quality and compact knowledge will contribute manager with a good decision model.Because of that, the search for appropriate data mining approach which can provide quality knowledge is important.Rough classifier (RC) and decision tree classifier (DTC) are categorized as RBC.The purpose of this study is to investigate the capability of RC and DTC in generating quality knowledge which leads to the good accuracy.To achieve that, both classifiers are compared based on four measurements that are accuracy of the classification, the number of rule, the length of rule, and the coverage of rule.Five dataset from UCI Machine Learning namely United States Congressional Voting Records, Credit Approval, Wisconsin Diagnostic Breast Cancer, Pima Indians Diabetes Database, and Vehicle Silhouettes are chosen as data experiment.All datasets were mined using RC toolkit namely ROSETTA while C4.5 algorithm in WEKA application was chosen as DTC rule generator.The experimental results indicated that both classifiers produced good classification result and had generated quality rule in different types of model – higher accuracy, fewer rule, shorter rule, and higher coverage.In term of accuracy, RC obtained higher accuracy in average while DTC significantly generated lower number of rule than RC.In term of rule length, RC produced compact and shorter rule than DTC and the length is not significantly different.Meanwhile, RC has better coverage than DTC.Final conclusion can be decided as follows “If the user interested at a variety of rule pattern with a good accuracy and the number of rule is not important, RC is the best solution whereas if the user looks for fewer nr, DTC might be the best choice”…”
Get full text
Get full text
Get full text
Get full text
Monograph -
20
